A repository to manage the configuration of Vault secret engines, authentication modes and policies.
Go to file
Ben Vincent 8070b6f66b feat: major restructuring in migration to terragrunt
- migrate from individual terraform files to config-driven terragrunt module structure
- add vault_cluster module with config discovery system
- replace individual .tf files with centralized config.hcl
- restructure auth and secret backends as configurable modules
- move auth roles and secret backends to yaml-based configuration
- convert policies from .hcl to .yaml format, add rules/auth definition
- add pre-commit hooks for yaml formatting and file cleanup
- add terragrunt cache to gitignore
- update makefile with terragrunt commands and format target
2026-01-26 23:02:44 +11:00
config feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
environments feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
modules/vault_cluster feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
policies feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
resources feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
.gitignore feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
.pre-commit-config.yaml feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
LICENSE Initial commit 2024-09-09 22:57:00 +10:00
Makefile feat: major restructuring in migration to terragrunt 2026-01-26 23:02:44 +11:00
README.md feat: import current status 2024-09-23 22:01:18 +10:00

terraform-vault

A repository to manage the configuration of Vault secret engines, authentication modes and policies.

Usage

  1. Initialize Terraform

Once you have your backend block configured, you need to initialize your Terraform working directory to configure the backend:

terraform init

This command initializes the backend and checks the connection to Consul. If everything is set up correctly, Terraform will start using Consul as its backend for storing the state.

  1. Common terraform init Errors

If you encounter errors while running terraform init, check the following:

Consul server is reachable: Make sure that the address is correct and that you can connect to the Consul server.
Consul token (if using ACLs): Verify that the token has the correct permissions to write to the specified path in the Consul KV store.
  1. Example Consul KV Structure

In Consul, the state file will be stored in the KV store under the specified path:

terraform/state

You can check the Consul KV store by accessing the Consul UI or using the consul kv command to see the stored Terraform state:

consul kv get terraform/state